xref: /netbsd-src/libexec/identd/identd.c (revision da5f4674a3fc214be3572d358b66af40ab9401e7)
1 /*	$NetBSD: identd.c,v 1.18 2003/05/17 21:24:38 itojun Exp $	*/
2 
3 /*
4 ** identd.c                       A TCP/IP link identification protocol server
5 **
6 ** This program is in the public domain and may be used freely by anyone
7 ** who wants to.
8 **
9 ** Last update: 7 Oct 1993
10 **
11 ** Please send bug fixes/bug reports to: Peter Eriksson <pen@lysator.liu.se>
12 */
13 
14 #if defined(IRIX) || defined(SVR4) || defined(NeXT) || (defined(sco) && sco >= 42) || defined(_AIX4) || defined(__NetBSD__) || defined(__FreeBSD__) || defined(ultrix)
15 #  define SIGRETURN_TYPE void
16 #  define SIGRETURN_TYPE_IS_VOID
17 #else
18 #  define SIGRETURN_TYPE int
19 #endif
20 
21 #ifdef SVR4
22 #  define STRNET
23 #endif
24 
25 #ifdef NeXT31
26 #  include <libc.h>
27 #endif
28 
29 #ifdef sco
30 #  define USE_SIGALARM
31 #endif
32 
33 #include <stdio.h>
34 #include <ctype.h>
35 #include <errno.h>
36 #include <netdb.h>
37 #include <signal.h>
38 #include <fcntl.h>
39 #include <poll.h>
40 
41 #include <sys/types.h>
42 #include <sys/param.h>
43 #include <sys/ioctl.h>
44 #include <sys/socket.h>
45 #ifndef _AUX_SOURCE
46 #  include <sys/file.h>
47 #endif
48 #include <sys/time.h>
49 #include <sys/wait.h>
50 
51 #include <pwd.h>
52 #include <grp.h>
53 
54 #include <netinet/in.h>
55 
56 #ifndef HPUX7
57 #  include <arpa/inet.h>
58 #endif
59 
60 #if defined(MIPS) || defined(BSD43)
61 extern int errno;
62 #endif
63 
64 #if defined(SOLARIS) || defined(__NetBSD__) || defined(__FreeBSD__) || defined(__linux__) || defined(_AIX)
65 #  include <unistd.h>
66 #  include <stdlib.h>
67 #  include <string.h>
68 #endif
69 
70 #include "identd.h"
71 #include "error.h"
72 #include "paths.h"
73 
74 
75 /* Antique unixes do not have these things defined... */
76 #ifndef FD_SETSIZE
77 #  define FD_SETSIZE 256
78 #endif
79 
80 #ifndef FD_SET
81 #  ifndef NFDBITS
82 #    define NFDBITS   	(sizeof(int) * NBBY)  /* bits per mask */
83 #  endif
84 #  define FD_SET(n, p)  ((p)->fds_bits[(n)/NFDBITS] |= (1 << ((n) % NFDBITS)))
85 #endif
86 
87 #ifndef FD_ZERO
88 #  define FD_ZERO(p)        bzero((char *)(p), sizeof(*(p)))
89 #endif
90 
91 
92 char *path_unix = (char *) NULL;
93 char *path_kmem = (char *) NULL;
94 
95 int verbose_flag = 0;
96 int debug_flag   = 0;
97 int syslog_flag  = 0;
98 int multi_flag   = 0;
99 int other_flag   = 0;
100 int unknown_flag = 0;
101 int noident_flag = 0;
102 int crypto_flag  = 0;
103 int liar_flag    = 0;
104 
105 int lport = 0;
106 int fport = 0;
107 
108 char *charset_name = (char *) NULL;
109 char *indirect_host = (char *) NULL;
110 char *indirect_password = (char *) NULL;
111 char *lie_string = (char *) NULL;
112 
113 #ifdef ALLOW_FORMAT
114     int format_flag = 0;
115     char *format = "%u";
116 #endif
117 
118 static int child_pid;
119 
120 #ifdef LOG_DAEMON
121 static int syslog_facility = LOG_DAEMON;
122 #endif
123 
124 static int comparemem __P((void *, void *, int));
125 char *clearmem __P((void *, int));
126 static SIGRETURN_TYPE child_handler __P((int));
127 int main __P((int, char *[]));
128 
129 /*
130 ** The structure passing convention for GCC is incompatible with
131 ** Suns own C compiler, so we define our own inet_ntoa() function.
132 ** (This should only affect GCC version 1 I think, a well, this works
133 ** for version 2 also so why bother.. :-)
134 */
135 #if defined(__GNUC__) && defined(__sparc__) && !defined(NeXT)
136 
137 #ifdef inet_ntoa
138 #undef inet_ntoa
139 #endif
140 
141 char *inet_ntoa(ad)
142     struct in_addr ad;
143 {
144     unsigned long int s_ad;
145     int a, b, c, d;
146     static char addr[20];
147 
148     s_ad = ad.s_addr;
149     d = s_ad % 256;
150     s_ad /= 256;
151     c = s_ad % 256;
152     s_ad /= 256;
153     b = s_ad % 256;
154     a = s_ad / 256;
155     snprintf(addr, sizeof(addr), "%d.%d.%d.%d", a, b, c, d);
156 
157     return addr;
158 }
159 #endif
160 
161 static int comparemem(vp1, vp2, len)
162      void *vp1;
163      void *vp2;
164      int len;
165 {
166     unsigned char *p1 = (unsigned char *) vp1;
167     unsigned char *p2 = (unsigned char *) vp2;
168     int c;
169 
170     while (len-- > 0)
171 	if ((c = (int) *p1++ - (int) *p2++) != 0)
172 	    return c;
173 
174     return 0;
175 }
176 
177 /*
178 ** Return the name of the connecting host, or the IP number as a string.
179 */
180 char *gethost(addr)
181     struct in_addr *addr;
182 {
183     int i;
184     struct hostent *hp;
185 
186 
187     hp = gethostbyaddr((char *) addr, sizeof(struct in_addr), AF_INET);
188     if (hp)
189     {
190 	char *hname = strdup(hp->h_name);
191 
192 	if (! hname) {
193 	    syslog(LOG_ERR, "strdup(%s): %m", hp->h_name);
194 	    exit(1);
195 	}
196 	/* Found a IP -> Name match, now try the reverse for security reasons */
197 	hp = gethostbyname(hname);
198 	(void) free(hname);
199 	if (hp)
200 #ifdef h_addr
201 	    for (i = 0; hp->h_addr_list[i]; i++)
202 		if (comparemem(hp->h_addr_list[i],
203 			       (unsigned char *) addr,
204 			       (int) sizeof(struct in_addr)) == 0)
205 		    return (char *) hp->h_name;
206 #else
207 	if (comparemem(hp->h_addr, addr, sizeof(struct in_addr)) == 0)
208 	    return hp->h_name;
209 #endif
210   }
211 
212   return inet_ntoa(*addr);
213 }
214 
215 #ifdef USE_SIGALARM
216 /*
217 ** Exit cleanly after our time's up.
218 */
219 static SIGRETURN_TYPE
220 alarm_handler(int s)
221 {
222     if (syslog_flag)
223 	syslog(LOG_DEBUG, "SIGALRM triggered, exiting");
224 
225     exit(0);
226 }
227 #endif
228 
229 
230 #if !defined(hpux) && !defined(__hpux) && !defined(SVR4) && \
231     !defined(_CRAY) && !defined(sco) && !defined(LINUX)
232 /*
233 ** This is used to clean up zombie child processes
234 ** if the -w or -b options are used.
235 */
236 static SIGRETURN_TYPE
237 child_handler(dummy)
238 	int dummy;
239 {
240 #if defined(NeXT) || (defined(__sgi) && defined(__SVR3))
241     union wait status;
242 #else
243     int status;
244 #endif
245     int saved_errno = errno;
246 
247     while (wait3(&status, WNOHANG, NULL) > 0)
248 	;
249 
250     errno = saved_errno;
251 
252 #ifndef SIGRETURN_TYPE_IS_VOID
253     return 0;
254 #endif
255 }
256 #endif
257 
258 
259 char *clearmem(vbp, len)
260      void *vbp;
261      int len;
262 {
263     char *bp = (char *) vbp;
264     char *cp;
265 
266     cp = bp;
267     while (len-- > 0)
268 	*cp++ = 0;
269 
270     return bp;
271 }
272 
273 
274 /*
275 ** Main entry point into this daemon
276 */
277 int main(argc,argv)
278     int argc;
279     char *argv[];
280 {
281     int i, len;
282     struct sockaddr_in sin;
283     struct in_addr laddr, faddr;
284     int one = 1;
285 
286     int background_flag = 0;
287     int timeout = 0;
288     char *portno = "113";
289     char *bind_address = (char *) NULL;
290     int set_uid = 0;
291     int set_gid = 0;
292     int inhibit_default_config = 0;
293     int opt_count = 0;		/* Count of option flags */
294 
295 #ifdef __convex__
296     argc--;    /* get rid of extra argument passed by inetd */
297 #endif
298 
299 
300     if (isatty(0))
301 	background_flag = 1;
302 
303     /*
304     ** Prescan the arguments for "-f<config-file>" switches
305     */
306     inhibit_default_config = 0;
307     for (i = 1; i < argc && argv[i][0] == '-'; i++)
308 	if (argv[i][1] == 'f')
309 	    inhibit_default_config = 1;
310 
311     /*
312     ** Parse the default config file - if it exists
313     */
314     if (!inhibit_default_config)
315 	parse_config(NULL, 1);
316 
317     /*
318     ** Parse the command line arguments
319     */
320     for (i = 1; i < argc && argv[i][0] == '-'; i++) {
321 	opt_count++;
322 	switch (argv[i][1])
323 	{
324 	  case 'b':    /* Start as standalone daemon */
325 	    background_flag = 1;
326 	    break;
327 
328 	  case 'w':    /* Start from Inetd, wait mode */
329 	    background_flag = 2;
330 	    break;
331 
332 	  case 'i':    /* Start from Inetd, nowait mode */
333 	    background_flag = 0;
334 	    break;
335 
336 	  case 't':
337 	    timeout = atoi(argv[i]+2);
338 	    break;
339 
340 	  case 'p':
341 	    portno = argv[i]+2;
342 	    break;
343 
344 	  case 'a':
345 	    bind_address = argv[i]+2;
346 	    break;
347 
348 	  case 'u':
349 	    if (isdigit(argv[i][2]))
350 		set_uid = atoi(argv[i]+2);
351 	    else
352 	    {
353 		struct passwd *pwd;
354 
355 		pwd = getpwnam(argv[i]+2);
356 		if (!pwd)
357 		    ERROR1("no such user (%s) for -u option", argv[i]+2);
358 		else
359 		{
360 		    set_uid = pwd->pw_uid;
361 		    set_gid = pwd->pw_gid;
362 		}
363 	    }
364 	    break;
365 
366 	  case 'g':
367 	    if (isdigit(argv[i][2]))
368 		set_gid = atoi(argv[i]+2);
369 	    else
370 	    {
371 		struct group *grp;
372 
373 		grp = getgrnam(argv[i]+2);
374 		if (!grp)
375 		    ERROR1("no such group (%s) for -g option", argv[i]+2);
376 		else
377 		    set_gid = grp->gr_gid;
378 	    }
379 	    break;
380 
381 	  case 'c':
382 	    charset_name = argv[i]+2;
383 	    break;
384 
385 	  case 'r':
386 	    indirect_host = argv[i]+2;
387 	    break;
388 
389 	  case 'l':    /* Use the Syslog daemon for logging */
390 	    syslog_flag++;
391 	    break;
392 
393 	  case 'o':
394 	    other_flag = 1;
395 	    break;
396 
397 	  case 'e':
398 	    unknown_flag = 1;
399 	    break;
400 
401 	  case 'V':    /* Give version of this daemon */
402 	    printf("[in.identd, version %s]\r\n", version);
403 	    exit(0);
404 	    break;
405 
406 	  case 'v':    /* Be verbose */
407 	    verbose_flag++;
408 	    break;
409 
410 	  case 'd':    /* Enable debugging */
411 	    debug_flag++;
412 	    break;
413 
414 	  case 'm':    /* Enable multiline queries */
415 	    multi_flag++;
416 	    break;
417 
418 	  case 'N':    /* Enable users ".noident" files */
419 	    noident_flag++;
420 	    break;
421 
422 #ifdef INCLUDE_CRYPT
423           case 'C':    /* Enable encryption. */
424 	    {
425 		FILE *keyfile;
426 
427 		if (argv[i][2])
428 		    keyfile = fopen(argv[i]+2, "r");
429 		else
430 		    keyfile = fopen(PATH_DESKEY, "r");
431 
432 		if (keyfile == NULL)
433 		{
434 		    ERROR("cannot open key file for option -C");
435 		}
436 		else
437 		{
438 		    char buf[1024];
439 
440 		    if (fgets(buf, 1024, keyfile) == NULL)
441 		    {
442 			ERROR("cannot read key file for option -C");
443 		    }
444 		    else
445 		    {
446 			init_encryption(buf);
447 			crypto_flag++;
448 		    }
449 		    fclose(keyfile);
450 		}
451 	    }
452             break;
453 #endif
454 
455 #ifdef ALLOW_FORMAT
456 	  case 'n': /* Compatibility flag - just send the user number */
457 	    format_flag = 1;
458 	    format = "%U";
459 	    break;
460 
461           case 'F':    /* Output format */
462 	    format_flag = 1;
463 	    format = argv[i]+2;
464 	    break;
465 #endif
466 
467 	  case 'L':	/* lie brazenly */
468 	    liar_flag = 1;
469 	    if (*(argv[i]+2) != '\0')
470 		lie_string = argv[i]+2;
471 	    else
472 #ifdef DEFAULT_LIE_USER
473 		lie_string = DEFAULT_LIE_USER;
474 #else
475 		ERROR("-L specified with no user name");
476 #endif
477 	    break;
478 
479 	  default:
480 	    ERROR1("Bad option %s", argv[i]);
481 	    break;
482 	}
483     }
484 
485 #if defined(_AUX_SOURCE) || defined (SUNOS35)
486     /* A/UX 2.0* & SunOS 3.5 calls us with an argument XXXXXXXX.YYYY
487     ** where XXXXXXXXX is the hexadecimal version of the callers
488     ** IP number, and YYYY is the port/socket or something.
489     ** It seems to be impossible to pass arguments to a daemon started
490     ** by inetd.
491     **
492     ** Just in case it is started from something else, then we only
493     ** skip the argument if no option flags have been seen.
494     */
495     if (opt_count == 0)
496 	argc--;
497 #endif
498 
499     /*
500     ** Path to kernel namelist file specified on command line
501     */
502     if (i < argc)
503 	path_unix = argv[i++];
504 
505     /*
506     ** Path to kernel memory device specified on command line
507     */
508     if (i < argc)
509 	path_kmem = argv[i++];
510 
511 
512     if (i < argc)
513 	ERROR1("Too many arguments: ignored from %s", argv[i]);
514 
515 
516     /*
517     ** We used to call k_open here. But then the file descriptor
518     ** kd->fd open on /dev/kmem is shared by all child processes.
519     ** From the fork(2) man page:
520     **      o  The child process has its own copy of the parent's descriptors.  These
521     **         descriptors reference the same underlying objects.  For instance, file
522     **         pointers in file objects are shared between the child and the parent
523     **         so that an lseek(2) on a descriptor in the child process can affect a
524     **         subsequent read(2) or write(2) by the parent.
525     ** Thus with concurrent (simultaneous) identd client processes,
526     ** they step on each other's toes when they use kvm_read.
527     **
528     ** Calling k_open here was a mistake for another reason too: we
529     ** did not yet honor -u and -g options. Presumably we are
530     ** running as root (unless the in.identd file is setuid), and
531     ** then we can open kmem regardless of -u and -g values.
532     **
533     **
534     ** Open the kernel memory device and read the nlist table
535     **
536     **     if (k_open() < 0)
537     ** 		ERROR("main: k_open");
538     */
539 
540     /*
541     ** Do the special handling needed for the "-b" flag
542     */
543     if (background_flag == 1)
544     {
545 	struct sockaddr_in addr;
546 	struct servent *sp;
547 	int fd;
548 
549 
550 	if (!debug_flag)
551 	{
552 	    if (fork())
553 		exit(0);
554 
555 	    close(0);
556 	    close(1);
557 	    close(2);
558 
559 	    if (fork())
560 		exit(0);
561 	}
562 
563 	fd = socket(AF_INET, SOCK_STREAM, 0);
564 	if (fd == -1)
565 	    ERROR("main: socket");
566 
567 	if (fd != 0)
568 	    dup2(fd, 0);
569 
570 	clearmem((void *) &addr, (int) sizeof(addr));
571 
572 	addr.sin_family = AF_INET;
573 	if (bind_address == (char *) NULL)
574 	    addr.sin_addr.s_addr = htonl(INADDR_ANY);
575 	else
576 	{
577 	    if (isdigit(bind_address[0]))
578 		addr.sin_addr.s_addr = inet_addr(bind_address);
579 	    else
580 	    {
581 		struct hostent *hp;
582 
583 		hp = gethostbyname(bind_address);
584 		if (!hp)
585 		    ERROR1("no such address (%s) for -a switch", bind_address);
586 
587 		/* This is ugly, should use memcpy() or bcopy() but... */
588 		addr.sin_addr.s_addr = * (unsigned long *) (hp->h_addr);
589 	    }
590 	}
591 
592 	if (isdigit(portno[0]))
593 	    addr.sin_port = htons(atoi(portno));
594 	else
595 	{
596 	    sp = getservbyname(portno, "tcp");
597 	    if (sp == (struct servent *) NULL)
598 		ERROR1("main: getservbyname: %s", portno);
599 	    addr.sin_port = sp->s_port;
600 	}
601 
602 #ifdef SO_REUSEADDR
603 	setsockopt(0, SOL_SOCKET, SO_REUSEADDR, (void *) &one, sizeof(one));
604 #endif
605 
606 	if (bind(0, (struct sockaddr *) &addr, sizeof(addr)) < 0)
607 	    ERROR("main: bind");
608     }
609 
610     if (background_flag)
611     {
612       if (listen(0, 3) < 0)
613 	ERROR("main: listen");
614     }
615 
616     if (set_gid)
617     {
618 	if (setgid(set_gid) == -1)
619 	    ERROR("main: setgid");
620 	/* Call me paranoid... PSz */
621 	if (getgid() != set_gid)
622 	    ERROR2("main: setgid failed: wanted %d, got GID %d", set_gid, getgid());
623 	if (getegid() != set_gid)
624 	    ERROR2("main: setgid failed: wanted %d, got EGID %d", set_gid, getegid());
625     }
626 
627     if (set_uid)
628     {
629 	if (setuid(set_uid) == -1)
630 	    ERROR("main: setuid");
631 	/* Call me paranoid... PSz */
632 	if (getuid() != set_uid)
633 	    ERROR2("main: setuid failed: wanted %d, got UID %d", set_uid, getuid());
634 	if (geteuid() != set_uid)
635 	    ERROR2("main: setuid failed: wanted %d, got EUID %d", set_uid, geteuid());
636     }
637 
638     if (syslog_flag) {
639 #ifdef LOG_DAEMON
640 	openlog("identd", LOG_PID, syslog_facility);
641 #else
642 	openlog("identd", LOG_PID);
643 #endif
644     }
645     (void)getpwnam("xyzzy");
646     (void)gethostbyname("xyzzy");
647 
648     /*
649     ** Do some special handling if the "-b" or "-w" flags are used
650     */
651     if (background_flag)
652     {
653 	int nfds, fd;
654 	struct pollfd set[1];
655 	struct sockaddr sad;
656 	int sadlen;
657 
658 
659 	/*
660 	** Set up the SIGCHLD signal child termination handler so
661 	** that we can avoid zombie processes hanging around and
662 	** handle childs terminating before being able to complete the
663 	** handshake.
664 	*/
665 #if (defined(SVR4) || defined(hpux) || defined(__hpux) || defined(IRIX) || \
666      defined(_CRAY) || defined(_AUX_SOURCE) || defined(sco) || \
667 	 defined(LINUX))
668 	signal(SIGCHLD, SIG_IGN);
669 #else
670 	signal(SIGCHLD, child_handler);
671 #endif
672 
673 	set[0].fd = 0;
674 	set[0].events = POLLIN;
675 
676 	/*
677 	** Loop and dispatch client handling processes
678 	*/
679 	do
680 	{
681 #ifdef USE_SIGALARM
682 	    /*
683 	    ** Terminate if we've been idle for 'timeout' seconds
684 	    */
685 	    if (background_flag == 2 && timeout)
686 	    {
687 		signal(SIGALRM, alarm_handler);
688 		alarm(timeout);
689 	    }
690 #endif
691 
692 	    /*
693 	    ** Wait for a connection request to occur.
694 	    ** Ignore EINTR (Interrupted System Call).
695 	    */
696 	    do
697 	    {
698 #ifndef USE_SIGALARM
699 		if (timeout)
700 		    nfds = poll(set, 1, timeout * 1000);
701 		else
702 #endif
703 		nfds = poll(set, 1, INFTIM);
704 	    } while (nfds < 0  && errno == EINTR);
705 
706 	    /*
707 	    ** An error occurred in select? Just die
708 	    */
709 	    if (nfds < 0)
710 		ERROR("main: poll");
711 
712 	    /*
713 	    ** Timeout limit reached. Exit nicely
714 	    */
715 	    if (nfds == 0)
716 		exit(0);
717 
718 #ifdef USE_SIGALARM
719 	    /*
720 	    ** Disable the alarm timeout
721 	    */
722 	    alarm(0);
723 #endif
724 
725 	    /*
726 	    ** Accept the new client
727 	    */
728 	    sadlen = sizeof(sad);
729 	    errno = 0;
730 	    fd = accept(0, &sad, &sadlen);
731 	    if (fd == -1)
732 		ERROR1("main: accept. errno = %d", errno);
733 
734 	    /*
735 	    ** And fork, then close the fd if we are the parent.
736 	    */
737 	    child_pid = fork();
738 	} while (child_pid && (close(fd), 1));
739 
740 	/*
741 	** We are now in child, the parent has returned to "do" above.
742 	*/
743 	if (dup2(fd, 0) == -1)
744 	    ERROR("main: dup2: failed fd 0");
745 
746 	if (dup2(fd, 1) == -1)
747 	    ERROR("main: dup2: failed fd 1");
748 
749 	if (dup2(fd, 2) == -1)
750 	    ERROR("main: dup2: failed fd 2");
751     }
752 
753     /*
754     ** Get foreign internet address
755     */
756     len = sizeof(sin);
757     if (getpeername(0, (struct sockaddr *) &sin, &len) == -1)
758     {
759 	/*
760 	** A user has tried to start us from the command line or
761 	** the network link died, in which case this message won't
762 	** reach to other end anyway, so lets give the poor user some
763 	** errors.
764 	*/
765 	perror("in.identd: getpeername()");
766 	exit(1);
767     }
768 
769     faddr = sin.sin_addr;
770 
771 
772 #ifdef STRONG_LOG
773     if (syslog_flag)
774 	syslog(LOG_INFO, "Connection from %s", gethost(&faddr));
775 #endif
776 
777 
778     /*
779     ** Get local internet address
780     */
781     len = sizeof(sin);
782 #ifdef ATTSVR4
783     if (t_getsockname(0, (struct sockaddr *) &sin, &len) == -1)
784 #else
785     if (getsockname(0, (struct sockaddr *) &sin, &len) == -1)
786 #endif
787     {
788 	/*
789 	** We can just die here, because if this fails then the
790 	** network has died and we haven't got anyone to return
791 	** errors to.
792 	*/
793 	exit(1);
794     }
795     laddr = sin.sin_addr;
796 
797 
798     /*
799     ** Get the local/foreign port pair from the luser
800     */
801     parse(stdin, &laddr, &faddr);
802 
803     exit(0);
804 }
805